First published: Wed Jan 20 2021(Updated: )
A vulnerability in the authentication for the general purpose APIs implementation of Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to access general system information and certain configuration information from an affected device. The vulnerability exists because a secure authentication token is not required when authenticating to the general purpose API. An attacker could exploit this vulnerability by sending a crafted request for information to the general purpose API on an affected device. A successful exploit could allow the attacker to obtain system and configuration information from the affected device, resulting in an unauthorized information disclosure.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Content Security Management Appliance | =12.5.0 | |
Cisco Email Security Appliance | =13.0.0 | |
Cisco Web Security Appliance | =11.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1129.
The severity level of CVE-2021-1129 is medium (5.3).
Cisco Content Security Management Appliance (12.5.0), Cisco Email Security Appliance (13.0.0), and Cisco Web Security Appliance (11.8.0) are affected by CVE-2021-1129.
An unauthenticated, remote attacker can access general system information.
Apply the necessary security patches or updates provided by Cisco.